• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  Use CAA DNS records for SSL Certificate and minimize cyber threats
Use CAA DNS records for SSL Certificate and minimize cyber threats
21 September 2017

Use CAA DNS records for SSL Certificate and minimize cyber threats

Written by Rohit Srivastwa
Rohit Srivastwa
Security

SSL or Secure Sockets Layer (commonly referred as HTTPS) has now become a necessity for protecting your websites whether it is handling any sensitive information or not. An organization needs to install SSL certificate, issued by a Certificate Authority (CA), onto its web server to initiate secure sessions with browsers. After installing SSL certificate, the domain name will reflect as https://www.domain.com, which further describes that the server is establishing a secure connection with the browser. Once a secure connection is established, the web traffic in between the web server and browser will be secure.

Before 8th September 2017, any random CA had the authority to issue an SSL certificate for a website. But, on the mentioned date, the CA/Browser Forum (CAB Forum) issued an all new defined policy for all CAs. According to this policy, to get an SSL certification, as a domain owner, you need to check the Domain Name System (DNS) record which specifies which CA is allowed to issue SSL certificate for your domain. So, now you will be able to determine an authorized CA for the SSL certificate issuance for your domain.

The Certificate Authority Authorization (CAA) DNS records will now decide whether the certificate provider is eligible to issue a secured certification for your domain or not. Let’s know more about CAA from the following.

What is CAA?
CAA or Certificate Authority Authorization is a standard which is designed to protect websites by preventing unauthorized issuance of SSL/TLS digital certificates. CAA records allow domain owners to decide over the authorized certificate authorities which are allowed to issue SSL/TLS certificates for your domain.

What is the need for CAA?
Any organization can get their SSL certificate issued by a CA. The downside to this process is that the SSL certificate can also be issued without the knowledge of the domain owner. This type of SSL certificate issuance does not guarantee any authentication and may not be able to secure your domain, which actually exposes your website to cyber criminals. In such a scenario, attackers can easily obtain access to your domain and misuse the database. At times, cyber criminals can even issue such requests or certificates or verification for the compromised domain using the name of any certificate authority. These unauthorized certificates can further be utilized to launch multiple cyber attacks.

The CAB Forum has now made the CAA record checking process a mandatory requirement as a part of the certificate issuing process, effective from 8th September 2017. It allows domain owners to get an authorized SSL/TLS certificate for their domain. The main goal of issuing this policy is to limit the illegitimate issuance of certificates.

Impact of CAA on SSL certificate issuance:

With the help of CAA DNS records, it is now possible to prevent unauthorized certificates mistakenly issued by an illegitimate CA. By checking the CAA records, you can easily recognize when an unauthorized CA has requested an SSL certificate which is not permitted by the domain owner.

CAA helps in preventing unauthorized certificate issuance by:

  • Allowing domain owners to check whether the CA is authorized to issue SSL/TLS certificate for their domain or not.
  • By providing authorization to CAs before issuing a certificate.

The outcome of using CAA DNS records for SSL certificates:

Checking CAA records will make it easier for an organization to accomplish a certificate issuance policy across multiple business units. Now, after making CAA record checking a mandate, organizations can now determine a specified set of authorized CAs who can issue SSL certificate for their domain.

This mandatory CAA record checking habit will definitely help in reducing the risks of issuing certificate mistakenly or inappropriately. Moreover, it only allows authorized CAs to issue SSL certificate for your domain and helps in creating a transparent ecosystem for domain owners.

 

So go ahead and start configuring the CAA value of the domains you own to protect your enterprise.

 

 Previous PostMobile Device Management: How to manage security of your mobile d...
Next Post  Security scorecard: How much does your organization score?
Rohit Srivastwa

About Rohit Srivastwa

Rohit Srivastwa is Senior Director, Cyber Education and Services at Quick Heal Technologies Ltd. He is a security evangelist and specialist in IT infrastructure,...

Articles by Rohit Srivastwa »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies